General
-
Target
f00a5edfac65339d1acde7ed08ae77cf5c1ad350ef19ef8ac3f2b14b8ccbc7e8
-
Size
1.3MB
-
Sample
230919-mza94age4x
-
MD5
0d72a4d10fe8d4753eed052c5b22d886
-
SHA1
2fa30a5701d2eeae4e25445d19246605016a99cc
-
SHA256
f00a5edfac65339d1acde7ed08ae77cf5c1ad350ef19ef8ac3f2b14b8ccbc7e8
-
SHA512
90f7f641cb2a49f807ec512d09cbeaa90c33e855fe69367009035acc2d067292fccc3a45d5ada5d03df01912ea0923f6faa83f9341da8d3ad36d5cfa68478605
-
SSDEEP
24576:pOut5LAH+tl11CH+asfwO2pV6Muy51LtZFkojsNOP4CuV05vs:r5UetD1fN23HJfLjNoeBuV05vs
Static task
static1
Behavioral task
behavioral1
Sample
f00a5edfac65339d1acde7ed08ae77cf5c1ad350ef19ef8ac3f2b14b8ccbc7e8.exe
Resource
win10v2004-20230915-en
Malware Config
Extracted
redline
vasha
77.91.124.82:19071
-
auth_value
42fc61786274daca54d589b85a2c1954
Targets
-
-
Target
f00a5edfac65339d1acde7ed08ae77cf5c1ad350ef19ef8ac3f2b14b8ccbc7e8
-
Size
1.3MB
-
MD5
0d72a4d10fe8d4753eed052c5b22d886
-
SHA1
2fa30a5701d2eeae4e25445d19246605016a99cc
-
SHA256
f00a5edfac65339d1acde7ed08ae77cf5c1ad350ef19ef8ac3f2b14b8ccbc7e8
-
SHA512
90f7f641cb2a49f807ec512d09cbeaa90c33e855fe69367009035acc2d067292fccc3a45d5ada5d03df01912ea0923f6faa83f9341da8d3ad36d5cfa68478605
-
SSDEEP
24576:pOut5LAH+tl11CH+asfwO2pV6Muy51LtZFkojsNOP4CuV05vs:r5UetD1fN23HJfLjNoeBuV05vs
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1